Tutorialspoint

April Learning Carnival is here, Use code FEST10 for an extra 10% off

Secure Software Design

person icon Stone River ELearning

3.9

Secure Software Design

Secure Software Design

updated on icon Updated on Apr, 2024

language icon Language - English

person icon Stone River ELearning

English [CC]

category icon Design,Game Design

Lectures -15

Resources -3

Duration -1 hours

3.9

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

In this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure. There are many benefits of designing security early which we cover in this course. We will cover what we need to be concerned with when procuring software.

Specifically, this course in the series we cover the need for Secure Software Design, Attack Surface Evaluation, Threat Model, Attack Tree, Secure Design Review, Risk Management, Define Security Architecture and we have a Whiteboard Discussion that a developer should be familiar with.

Who should take this course ?

  • You are a developer or software engineer and want to understand
  • You want to learn IT security fundamentals focused on software development

Goals

What will you learn in this course:

  • Understand the best practices around software development
  • Learn how to develop secure software
  • Understand the basics of the SDLC
  • Understand the Secure Design Process
  • Learn about the Threat Models and Attack Trees

Prerequisites

What are the prerequisites for this course?

  • There are no course pre-requirements


Secure Software Design

Curriculum

Check out the detailed breakdown of what’s inside the course

Secure Software Design
15 Lectures
  • play icon Course Overview 02:19 02:19
  • play icon Downloadable Files
  • play icon Instructor Intro 01:07 01:07
  • play icon Course Prereqs 00:43 00:43
  • play icon Need for Secure Software Design 06:23 06:23
  • play icon Attack Surface Evaluation 03:33 03:33
  • play icon Threat Model 18:49 18:49
  • play icon Attack Tree 01:47 01:47
  • play icon Secure Design Review 05:29 05:29
  • play icon Risk Management 07:33 07:33
  • play icon Define Security Architecture 13:42 13:42
  • play icon Whiteboard Discussion 07:28 07:28
  • play icon Module Review 02:08 02:08
  • play icon Review Questions 02:58 02:58
  • play icon Course Closeout 01:01 01:01

Instructor Details

Stone River eLearning

Stone River eLearning

e


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Feedbacks

C

Christopher Krechkowski

e

Fast pace but good

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515